You are on page 1of 24

Introduction to Access Control

Access control systems allow the free movement of authorized


personnel while restricting unauthorized intrusion. A device
that stops you from getting from A to B unless you are
Benefits of Access
authorized to do so.
Control
The device or devices •Protect property.
could be: •Protect revenues and
• Mechanical, Electric or assets.
Motorized Locks. •Protect staff.
• Turnstiles and •No need for keys.
Tubestiles. •No need for security
• Mechanical and guards.
Electric Gates, Barriers. •Management reports.
• Mechanical and •Protect privacy.
Electric Code Locks. •Reduce operational
• Audio and Visual Door costs
Entry Systems.
These are many different card technologies. In most applications,
proximity technology is the preferred solution.

Technology Cost Security


Barcode Low Cost Low Security
Magstripe Low Cost Low Security
Proximity Mid level Cost Med & High Security
Smart card Mid level Cost Med & High Security
Proximity/Keypad Mid level Cost Higher Security
combination
Biometrics High Cost Highest Security
Barcode Technology
Employs a pattern of bars and spaces of varying widths to represent the
user information. This is the same technology that is used by stores for
inventory control and checkout counters. Since the bar code is visible it is
easy to duplicate and as such is not considered to be a good choice for
systems where security is a major concern.
Magstripe Technology
Same technology as credit cards. Magnetic stripe technology requires the
card to come in direct contact with the reader head causing wear and a
shorter life span.
The cards are low cost but are easily duplicated, can easily become
damaged, and the readers require cleaning to remove any dirt build-up on
the read heads.
Proximity Technology
The proximity technology reader constantly
transmits a low-level fixed RF signal that
energizes the card. When the card is held at
a certain distance from the reader, the RF
signal is absorbed by a small coil inside the
card and powers up the card's microchip,
which contains a unique identification code.
Once powered, the card transmits the code
to the reader. The whole process is
completed in microseconds.

Benefits Include:
•No Moving Parts

•No Mechanical wear

•No Slots or read heads to maintain


Proximity with Keypad combination
Keypads should never be used by
themselves as it is too easy to give away
Pin codes to others.

Keypads however can be used in


conjunction with other technologies to
increase the level of security.
Lost or stolen cards can not be used to
gain access without the use of the Pin
code.

Proximity & Pin should be installed on all


external doors and also higher security
doors
Biometric Technology
System measures some physiological
properties of the user such as hand
geometry, Iris pattern, finger print
pattern or voice pattern.

These types of devices offer very high


security but also are the most expensive
and require that the user be present in
order to be enrolled into the system.

Use of biometrics requires careful


considerations in terms of environment,
speed and suitability.
Card & Reader Compatibility
Some cards are only compatible with certain readers. For example
SensorProx card, will only work with SensorProx readers, HID cards will
only work with HID readers...
Reader Model Card
SensorProx All SensorProx Cards
SensorProx MIFARE MIFARE cards (Ultra, 1k, 4k) Serial
reading not sector
S-Class S-Class and MIFARE (Serial Number
reading) cards.

What are proprietary Formats?


High security proprietary format created to prevent card duplication offering
a higher standard of security, example S-Class.
Wiegand Standard

Wiegand is communication protocol between the readers and the


controllers. Most proximity, biometric and wireless readers are wiegand
compatible. The standard format for weigand is 26 bits long.

26bit format
üCompatible with most access control panels on the market.

üCannot prevent card duplication (Lower security).


Access Control
Operation
Access Control Operation
Both the reader and the electronic locking device are connected to the
Controller.
The Controller is programmed via a PC with the GuardPoint software. The
information programmed into the Door Controller include: The unique card
number, Access rights and time zones applicable to that card (Who, Where
and When).
A cardholder presents the card to the reader.
The reader then transmits the card details to the controller it is attached to
If the card is valid the Door Controller will release the locking device securing
the door. If the card is not valid the Door Controller will not release the
locking device securing the door.

To come back through the door there are the following options:
Use a Request to Exit button.
Use another reader, on the same door. Known as read IN, read OUT.
Use a mechanical handle (dependant upon the device securing the door).
Break Glass Unit (BGU) Door Contact (DC)
Double pole break glass Monitoring the door
units should be always status is essential to
installed on the egress allow the user to know
side of the door as this will if the door has been left
provide immediate local open or forced open.
release of the door in case Without it the access
of fire. BGU should be control system is
monitored so breakage running in low security
can
Exitbe reported. mode.
Button (RTE) Maglock
Exit buttons are used to Electronic locking
release the locking mechanism is required
hardware for all FREE to lock and release the
EGRESS doors. door, many versions and
types are available
depending on the door
and application.
Controlled Door:  
Outside View
This is an illustration of the non-secured side of
an access controlled door.

Check List :
•Reader

•Keypad (optional)

•Outside door handle should be permanently

locked/disabled
Controlled Door:   Inside View – Free
Egress
This illustration is the most common. It allows
users to exit the protected area freely. It is called
FREE EGRESS

Check List :
•Maglock

•Door Contact

•Break Glass Unit (BGU)

•Exit Button (RTE)


Controlled Door:   Inside View –
Controlled Egress
This is more secure but also a more expensive
option. It monitors and controls which user is
exiting the area. It is called CONTROLLED EGRESS

Check List :
•Maglock

•Door Contact

•Reader

•Break Glass Unit (BGU)


Communication Methods
– TCP/IP

TCP/IP
The access control software can send
and receive information to the
controllers using an existing Ethernet
Network known as either:

1. Local bases; LAN Local Area


Network.
2. Bigger scale/Remote; WAN Wide
Area Network.

Key advantage is the ability to


install the control equipment over
many locations without the need for
dedicated cable and containment
hence will save costs.

Considerations Co-operation of IT
Communication Methods –
RS-485

RS-485
The access control software can send
and receive information to the
controllers using a dedicated cable
running from controller to controller
and back to the PC.

Key advantage is the fact that it


allows full control of the system
without IT involvement and can in
some cases save money.

Considerations; Limited to a
distance of 1000 m per loop and the
cable run must not be mixed with
power cables and ideally running
along side low voltage cables on own
Communication Methods –
Wireless

Wireless
The access control software can send
and receive information to the
controllers using wireless technology
to transmit the data in either TCP/IP
or RS-485 protocols.

Options:
WIFI, GSM allows the use of
different wireless technologies for
transmitting TCP/IP protocols.
Wireless RS-485 Specifically
transmits RS-485 signal.

Key advantage Eliminates the need


for cabling between controllers and
server.
Data Storage/Access

Workstation
Server
The system can be managed
The access control software
from other locations and for
works with a database that
this a workstation is required,
manages all the records,
The data is still based at
transaction etc. This can be
Server.
MS Access or SQL. All this data
is stored in the main server.

Intelligent Controller
Certain parts of the database
are loaded from the server to
the controller. Controller will
continue to work even if server
is not connected. Some
functions may be effected if
such loss takes place.
Basic Access Control Types

Stand Alone
This method of controlling access to the
door does not utilise software, all
programming, deleting, adding is done
from the device itself. No reporting or
networking is available at that level. If
multiple doors are required to be
controlled, then programming needs to be
done separately at each door.

PC Based
This method allows the user to control the
whole system using software. Multiple
doors and sites can be controlled
centrally, with full reporting and
scheduling available. With this version
you can have the software installed in a
PC locally or have the software hosted
Basic Access Terminology
Access Groups/Time Schedules

Time Schedules
In order to create restrictions for the
times when certain doors can be used, it
is essential to create daily schedules and
weekly which defines the times when
certain doors are intended to be used.
This must be the first consideration for
the system before programming the
system starts. Example for office staff (9-
6 Monday to Friday)

Access Groups

Once the schedules has been defined, you


need to define groups of people that can
be put in a group which can share the
same door authorisations. For example
Management, Office, Factory staff.
Basic Access Terminology Anti-
Pass back

Anti-Passback A
Anti-Passback is used to increase the
level of security in a building by not
allowing users to tailgate (Follow person D
in front without presenting a valid card).
Example if someone tailgated and ended A B
up in area C, then they try and exit using C
exit reader C, the system will not allow
this transaction.

Considerations
Questions
ü You will need to have readers on both
sides of the door. What is Global Anti-Passback or (Local)
ü It is recommend that this feature is used

hand on hand with physical barriers, like What is soft Anti-Passback (Hard)?
turnstiles.
ü If not used correctly, it can cause serious
Questions

1. If you were to advice a school requiring access control for 10 doors, what type
of system, technology would you recommend and why?

2. Insurance Company approaches your company and wants to have Biometrics


installed on all 20 doors in office. What are your thoughts and considerations?

3. Customer asks question about the PC based system that you are looking to
offer; Will the system still work if the PC goes down?

4. End user wants to have a new system installed, but insist to use Magnetic
Stripe Technology. What is your advice?

5. Sport Club have 5 doors to control for use of members and staff, they have
about 2,000 members and 30 staff. They want you to install 5 stand alone
systems to keep the costs down! What are your thoughts and
recommendations.?

You might also like